Armando is trying to decide how he will alert players that the game is over in the new video game that he is designing. He is considering showing a message that says “Game Over” or perhaps showing a scoreboard at the end. Which of the four elements is Armando working on in his GDD? operation obstacles outcome objective

Answers

Answer 1

Answer:

He is working on the outcome

Explanation:

Because this is the outcome if you fail or die and the other objectives are the following

operation: A single objective in a level of the the whole game

obstacles: Trying to stop the player like blocks or walls or traps

objective:The main goal of the game

Answer 2

Answer:

D. outcome

Explanation:


Related Questions

Iman manages a database for a website that reviews movies. If a new movie is going to be added to the database, what else will need to be added?

a PDF

a table

a file

a record

Answers

The answer would be “a record.”
Correct it is a record

many electronic devices use a (?), which contains all the circuit parts in a miniature form.

Answers

Answer:

An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material.

Answer:

An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material. (A semiconductor is a nonmetallic material that can conduct an electric current, but does so rather poorly.)

Explanation:

Hope it helps

HOW DO YOU TURN CAPS LOCK OFF ON CHROMEBOOK

Answers

Press the caps lock button
Press caps lock again

please help me with this question if you answer it right ill make your answer brainliest <3

please help me with this question if you answer it right ill make your answer brainliest &lt;3

Answers

1. Molecular

2. Macroscopic

First one is molecular second one is macroscopic

what is a logic circuit?

Answers

Answer:

A logic circuit is an electronic circuit that performs a specific logical operation on one or more binary inputs to produce a binary output. Logic circuits are made up of electronic components, such as transistors, diodes, and resistors, which are arranged in a specific way to implement a particular logical function, such as AND, OR, NOT, and XOR.

Logic circuits are used in many digital electronics applications, such as computers, calculators, and electronic control systems. They are designed to process digital signals, which consist of binary data represented by voltage levels or current flow. By manipulating these signals with logical operations, logic circuits can perform arithmetic, comparison, and decision-making functions, among others.

There are many different types of logic circuits, ranging from simple gates that perform basic logical functions, to more complex circuits that implement more advanced functions, such as flip-flops and registers that can store and manipulate data. The design and analysis of logic circuits is an important area of study in electrical engineering and computer science.

Explanation:

Answer: a circuit for performing logical operations on input signals.

Explanation: Pleas give brainliest

What did Edison's device to view motion pictures inspire the Lumiere brothers to invent?


the______ invented by the Lumiere brothers in Paris included a _______. Thus, it could be used for mass viewings.

blank 1 kinetoscope, vitascope, cinematographe.

blank 2 camera, projector, phonograph

Answers

Blank 1 is kinetoscope and blank 2 is phonograph
the first blank is kinetoscope and the second one is phonograph

Name 10 reasons why computers are better than other electronic devices? :)

Answers

Desktop and laptop computers can run more powerful software than a smartphone or tablet due to their size, components, and less restrictive power requirements. Also phones can connect to a mobile data network; many tablets offer mobile data connectivity as well.
A computer is a powerful tool because it is able to perform the information processing cycle operations (input, process, output, and storage) with amazing speed, reliability, and accuracy; store huge amounts of data and information; and communicate with other computers.

(The game is called "SIMPLE RPG", it's a game on Scratch so plz help me?)

1. One particular way that game designers can keep engagement high and minimize boredom is through well-placed conflict. In the gaming world, conflict often means introducing and using obstacles that make it difficult for the player to achieve their objective. Game designers have the crucial task of using just the right amount of conflict so that players stay interested but don’t get too frustrated.
Identify and describe the conflict that happens in the game Simple RPG. Does the conflict change over time? If so, what does this change in conflict add to the game?

2. Identify three game mechanics that you observed in the game. Describe how they worked in the game and how they could be improved.

3. How many different backdrops were used in this game? (Hint: look inside the code at the backdrops section if you are unsure from playing the game.) Explain the purpose of each backdrop (to change levels, display a menu, etc.) and state what the trigger is for changing it.

Answers

Answer:

Rpg means role playing game

How might the interconnectedness of the world today change the way we view human rights issues?

Answers

Answer:

The interconnectedness of the world today has the potential to change the way we view human rights issues in several ways:

1. Increased awareness: The internet, social media, and other forms of technology have made it easier for people around the world to learn about human rights abuses and violations. We can now follow news and events in real-time and connect with people from different parts of the world to share information and opinions. This increased awareness can put pressure on governments and organizations to address human rights abuses and hold perpetrators accountable.

2. Greater accountability: The interconnectedness of the world also means that it is easier to hold individuals and organizations accountable for human rights abuses. With the use of technology, it is easier to document abuses and gather evidence, making it more difficult for perpetrators to deny or conceal their actions.

3. Global cooperation: The interconnectedness of the world can foster greater global cooperation on human rights issues. Countries, organizations, and individuals can work together to address human rights abuses and violations, regardless of geographic location.

4. Greater emphasis on universal values: The interconnectedness of the world can lead to a greater emphasis on universal values, such as human dignity and equality. As people from different parts of the world connect and share information, they may come to recognize the importance of these values in promoting peace and justice for all.

5. New challenges: While the interconnectedness of the world offers many opportunities to promote human rights, it also presents new challenges. For example, the rise of cybercrime and cyber warfare can threaten privacy and freedom of expression, which are essential components of human rights.

Overall, the interconnectedness of the world today has the potential to change the way we view human rights issues by increasing awareness, promoting greater accountability and global cooperation, emphasizing universal values, and presenting new challenges.

The inter connectedness of the world today has the potential to change the way we view human rights issues in several ways such as increased awareness, Greater accountability and Global cooperation.

What are the main objects that helps to increase the awareness among people?

The internet, social media, and other forms of technology have made it easier for people around the world to learn about human rights abuses and violations. We can now follow news and events in real-time and connect with people from different parts of the world to share information and opinions.

This increased awareness can put pressure on governments and organizations to address human rights abuses and hold perpetrators accountable. The inter connectedness of the world also means that it is easier to hold individuals and organizations accountable for human rights abuses.

With the use of technology, it is easier to document abuses and gather evidence, making it more difficult for perpetrators to deny or conceal their actions. Greater emphasis on universal values: The interconnectedness of the world can lead to a greater emphasis on universal values, such as human dignity and equality.

Therefore,  e view human rights issues in several ways such as increased awareness, Greater accountability and Global cooperation.

Learn more about awareness on:

https://brainly.com/question/10704836

#SPJ2

Which is an example of an effective study skill?

Which is an example of an effective study skill?

Answers

Answer:

the making note cards and quizzing yourself

Explanation:

Have Notes and call over a friend and test each other

NO LINKS!! HELP!!! PHOTOGRAPHY CLASS ESSAY 2

NO LINKS!! HELP!!! PHOTOGRAPHY CLASS ESSAY 2
NO LINKS!! HELP!!! PHOTOGRAPHY CLASS ESSAY 2

Answers

2. What is special about photographs?

Photographs are special because it shows all of the artistry and reflects the eye of the person who took the photo, not only that but it also shows how the photographer shot it, it shows a whole new meaning because of that.

3. In order to be a great photojournalist one must be okay being behind a camera, and you would also need to know how to edit photos well and bring out the story in the photo.

I know I haven't answered all of the questions, but this is all I can do because I don't have other resources to help you with.

My answers should only be used as last minute answers!!!! (or you can just use mine if you want)

Answer:i do not not know

Explanation:25 Jan 2021 — Securing Your Devices and Networks · 1. Encrypt your data. · 2. Backup your data. · 3. The cloud provides a viable backup option. · 4. Anti-malware ...

‎Data Protection Tips for Mobile Devices · ‎Protecting Your Identity

Which of the following statements is true about using samples for research studies instead of entire populations?


Using a sample is more expensive, because more care must be taken selecting subjects.

Using a sample is more time-intensive, because more care must be taken selecting subjects.

Using a sample is more wasteful, because data about the rest of the population is not included.

Using a sample is more accurate, because more care must be taken assessing each response.

Please help!

Answers

Answer:

Using a sample is more accurate, because more care must be taken assessing each response.

Explanation:

A "sample" is considered more accurate than a population because it prevents bias when it comes to responses--provided that each response was carefully assessed. This can give an exact representation of the entire population.

It is definitely not more expensive, not more time-intensive nor wasteful because it is more manageable, cost-effective and feasible than a population.

Emma is upset that her friend shared a picture of her from elementary school. She types a negative reply to her post, but then decides to wait until she calms down. Which rule of netiquette did Emma follow? (5 points) Ask permission. Don't post when angry. Don't use inappropriate or hateful language. Expect tough consequences.

Answers

Answer:

Dont post when angry.

Explanation:

It makes most sense out of the four answers due to context clues.

Answer: don’t post when angry

plsss help u will get brainliest
i need a Y word to describe myself for an acrostic
HURRY PLSS

Answers

Answer:

Young-at-Heart having a youthful or fresh spirit not depended of one's age; act in a way like younger person does.

Yare lively; eager; keen; agile; dexterous; ready; prepared.

Explanation:

got those ones hope it helps

Answer:

yappy or youthful

Explanation:

youthful means  fresh; vigorous; active

yappy means talkative; loquacious

An example of how a merge code would appear in a letter would be _____.

Answers

Answer:

Space blank

Explanation:

It means the question needs you to answer the question

Answer:

An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.

Explanation:

I hope this helps

All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break down how this works (hint: Ascii) . Explain in three or more sentences: Please Answer ASAP, Brainiest for Best and most In detail answer!!!!!

Answers

Can I have the Brainiest pls pls pls

On the Audio Tools contextual tab, which tab will control how the audio file appears, if it appears, on the slide itself?

Bookmarks
Playback
Format
Design

Answers

Playback is the answer
Playback is the correct answer
MP3 utilizes playback

I'LL GIVE BRAINLIEST!
Develop a function that Accepts 4 parameters: name, pensize, color and length Draw a turtle octagon based on the color, pensize and length parameter Use this function to draw 1 orange octagon with length= 50 and pensize= 5 Use this function to draw another octagon with color=blue, length = 100 and pensize=10

Answers

Answer:

We are to write a function with the name drawTick()

It has two parameters: a turtle t and an integer tickLen which is the length of the tick

The function then is

drawTick(perpendicular(t), 0.01) indicating that the tick is perpendicular to the turtle and has a length of 0.01 m.

Explanation:

Answer:

Move and draw

forward() | fd()

backward() | bk() | back()

right() | rt()

left() | lt()

goto() | setpos() | setposition()

setx()

sety()

setheading() | seth()

home()

circle()

dot()

stamp()

clearstamp()

clearstamps()

undo()

speed()

Explanation:

Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?

a
Ignore the request and not enter any personal information.

b
Provide only her name and date of birth.

c
Provide only her name and address.

d
Provide the requested information to receive the discount.

Answers

Answer:

a

Explanation:

sis is gonna get scammed

Answer:

a

Explanation:

You dont know who is getting your information and it is not someone you know. STRANGER DANGER!

can someone describe how sampling is used to capture audio on a computer?
please make it easy I am struggling. Im in 7th.

Answers

Answer: Sampling is a method of converting an analogue audio signal into a digital signal.

Explanation:

While sampling a sound wave, the computer takes measurements of this sound wave at a regular interval called sampling interval. Each measurement is then saved as a number in binary format.

What the person said above me



Tech A says that no matter which way the vehicle turns, the inside wheel must always turn less sharply than the outside wheel. Tech B says that the

Ackermann principle angles the steering arms toward the center of the rear axle. Who is correct?


A Tech A


B Tech B

C Both A and B


D Neither A nor B

Answers

D would hxh vigil be correct

The Ackermann level of a vehicle's steering geometry is expressed as a percentage, with 100% Ackermann denoting that the angle of steer difference between the inside and outside tyres exactly matches the geometric low-speed turn center. Ackermann or Anti-Ackermann are rarely used in full force in racing vehicles. Thus, option B is correct.

What Ackermann principle angles the steering arms?

In the picture on the left, the steering arms are slanted inward to provide a way for the wheel angles to change more slowly. This causes the wheels to turn at an uneven angle and is the basis of the Ackerman Steering Principle.

As you turn the wheel, the steering wheel's shaft also revolves. This then rotates the pinion, which is situated on top of the rack. While the tie rod is moved by the rotation of the pinion, the rack moves linearly. The tie rod connected to the steering arm then causes the wheel to revolve.

Therefore, Ackermann principle angles the steering arms toward the centre of the rear axle.

Learn more about Ackermann here:

https://brainly.com/question/29676606

#SPJ5

If you see that your bank account has had some money taken out that you did not authorize, which of the following is one action you can take to defend yourself?
A. File a police report.
B. Add more money to the back account.
C. Try to contact the person you think took your money.
D. Leave the bank account open to see if more money is taken.

Answers

I think the answer is A. File a police report,
A, File a police report

When Eliza was first written (in 1966), some people thought it seemed human. Did Eliza seem human to you? Why or why not?

When Eliza was first written (in 1966), some people thought it seemed human. Did Eliza seem human to

Answers

Answer:

yes she is a real person she had  a son named Phil and her husband was alexander Hamilton he died in a duel with the vice president Aaron burr

there son died in a duel two so Eliza  was just alone in the world with out her some and husband  she ran a orphanage and saw all of the kids and it reminded her of Alex  

Explanation:

Answer:

yeah shes human i refuse to think shes not

Explanation:

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )

Answers

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

Describe how pseudocode makes programming more efficient for large programming tasks.

Answers

Answer:Pseudocode helps us understand tasks in a language-agnostic manner. Is it best practice or suggested approach to have pseudocode creation as part of the development lifecycle? For instance:

Identify and split the coding tasks

Write pseudocode

Get it approved [by PL or TL]

Start Coding based on Pseudocode

Explanation: use phrasing tool if you want to write in your own words.

It helps us understand tasks in a language

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

Which statement describes the word "iterative"?

1)Working in cycles where everyone is involved in making new versions of the application each time than picking the best one at the end.

2)Working in a way to make sure that the product is perfect the first time.

3)Working in cycles and building on previous versions to build an application through a process of prototyping, testing, analyzing, and refining.

4)Working as a team to take on each other's ideas when they notice the mistakes you've made.

Answers

Answer:4 should be correct

Explanation:

The answer is option 4 I believe if you need proof tell me and tell me how this photo is I do photography
Which statement describes the word "iterative"?1)Working in cycles where everyone is involved in making

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

Jaime has been hired as a consultant for a company. His task is to help the company spend less time and money writing code. Jaime notices that, even for very complicated programs, the programmers at this company start programming without an overall plan for the development of the code. What might Jaime suggest that they do instead?

A.
begin by writing the final lines of the program instead of the first lines

B.
program in C++ instead of in Python

C.
begin by creating a pseudocode

D.
spend more time debugging

Answers

C. begin by creating a pseudocode Step-by-step solution: 1. The problem mentions that the programmers at the company start programming without an overall plan for the development of the code. 2. To address this issue, Jaime should suggest that they begin by creating a pseudocode. 3. Pseudocode is a high-level description of the program that uses natural language and basic programming structures to outline the logic and flow of the program. 4. Creating a pseudocode helps the programmers develop a plan for the overall structure of the code before they begin writing actual code. 5. This can save time and money in the long run by reducing the number of errors and bugs that need to be fixed. 6. Therefore, option C, "begin by creating a pseudocode," is the best suggestion that Jaime can provide to the company.

Answer:

C

Explanation:

i had to answer this question on a test and ended up getting it right, hope this helps!! :D

Other Questions
The _____ people produced the first Chinese writing system.1)Zhou2)Huang3)Shang4)Qin Which of the following applies to farmers in the 1920s?A. They benefited from government programs to stabilize production.B. Falling prices for farm products made it difficult for them to pay their debts.C. They made high-risk investments in the stock market and made a fortune. the _____ system is the body's primary communication network. nervous sympathetic nervous endocrine limbic What does an upright (straight) body posture convey or show? [ ](a) Pride (b) Professionalism (c) Confidence (d) Humility Please help I will make you Brainliest (show working) What is the slope of the line that is parallel to the line whose equation is 4x+y-2=0? sunny earns $12 per hour delivering cakes. She worked for x hours this week. Unfortunately, she was charged $15 for a late delivery on Tuesday ? Use inverse trigonometric measures to find the measure of the indicated angle to the nearest degree. Discuss the relevant example(s) and justification, the connection between a company's strategy and its quest for sustainable competitive advantage. The Sugar Act of 1934 gave U.S. farmers an even better deal by creating a quota ... U.S. sugar farmers have enjoyed protection from imports since 1789 when ... How high rate of child mortality changes population??Answer please A track team captain thinks that eating breakfast and having a good night's sleep may affect the team's performance.The track team decides to test if eating breakfast makes a difference in how fast they can run one mile. They decide to split the team into two groups. One group eats breakfast two hours before running and the other group does not eat breakfast. The students also make a rule that both groups have to get a good night's sleep before they run. Is this rule necessary? A. Yes, because the rule allows the team to only test one variable at a time, keeping everything else a constant. B. No, because they can judge the effect of having breakfast even if the students do not get enough sleep. C. No, because they can judge the effect of having breakfast only if some students do not get enough sleep. D. Yes, because they can judge the effect of both breakfast and sleep if all students get enough sleep. The postInvalidate method of the View class that has no parameter triggers a call to the __________________ method and refreshes the whole View. cualidad que empieza con la letra i A process that is run __________ leaves the BASH shell available for the user to execute additional commands.in the backgroundin the foregroundofflineonline HELP!! 65 POINTS!!Sigmund Freud's theories are considered both controversial and influential. Based on what you learned in the lesson, do you agree with Freud's theories? Use specific examples to support your answer. On your post-graduation celebratory trip you decide to travel from Jeddah, Saudi Arabia to Cambridge, Great Britain. You leave Jeddah with 14.9 thousands of SAR in your wallet. Wanting to exchange all of these for pounds, you obtain the following quotes. Spot rate on the pound/dollar cross rate 0.7292 GBP/USD Spot rate on the riyal/dollar cross rate: 3.74 SAR/USD What is the riyal/pound cross rate? 4. 3 23 -5 2 3 -5 -4 -3 -2 -1 0 (3-1) 1 2 -2 -4 -5 21) 0=- 14-2 the piont of strection is (-30 X=-3 y24 3+4=3x-2 Bet=-3X-4 yal 4) 4x + y = 2 The system in the image below is atequilibrium. There is a roller at point A and a pin at point B.There is a distributed load acting on part of the beam as shown.Identify and determine the magnitud Nadine saw that there was 4/5 of a pie left after their family picnic. Each slice of pie was 1/15 of the total pie. How many slices of pie are left?